Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher.
Stories by Lucian Constantin
A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.
Apple fixed a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.
Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.
A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).
Google offered to pay US$200,000 to any researcher who could remotely hack into an Android device by knowing only the victim's phone number and email address, but no one stepped up to the challenge for six months.
A proof-of-concept exploit has been published for a zero-day vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported.
Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.
VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines.
The source code for a new banking Trojan has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.
Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware.
The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.
Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and to force the company to replace all of its customers' certificates.
The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services.
The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
- SQL Server Database Developer SA
- Technical Writer ACT
- UAT Test Coordinator QLD
- Senior Network Engineer - RAN VIC
- Test Analyst - Oracle CC&B VIC
- Devops Consultant - 12 month contract VIC
- Senior Linux Administrator NSW
- SAP ISU Technical Consultant VIC
- Test Analyst - Infrastructure - NV1 Clearance ACT
- Senior Business Analyst, Wealth Investment NSW